Cargando…

Evolutionary approach to violating group anonymity using third-party data

In the era of Big Data, it is almost impossible to completely restrict access to primary non-aggregated statistical data. However, risk of violating privacy of individual respondents and groups of respondents by analyzing primary data has not been reduced. There is a need in developing subtler metho...

Descripción completa

Detalles Bibliográficos
Autores principales: Tavrov, Dan, Chertov, Oleg
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4728171/
https://www.ncbi.nlm.nih.gov/pubmed/26844025
http://dx.doi.org/10.1186/s40064-016-1692-9
_version_ 1782412070416809984
author Tavrov, Dan
Chertov, Oleg
author_facet Tavrov, Dan
Chertov, Oleg
author_sort Tavrov, Dan
collection PubMed
description In the era of Big Data, it is almost impossible to completely restrict access to primary non-aggregated statistical data. However, risk of violating privacy of individual respondents and groups of respondents by analyzing primary data has not been reduced. There is a need in developing subtler methods of data protection to come to grips with these challenges. In some cases, individual and group privacy can be easily violated, because the primary data contain attributes that uniquely identify individuals and groups thereof. Removing such attributes from the dataset is a crude solution and does not guarantee complete privacy. In the field of providing individual data anonymity, this problem has been widely recognized, and various methods have been proposed to solve it. In the current work, we demonstrate that it is possible to violate group anonymity as well, even if those attributes that uniquely identify the group are removed. As it turns out, it is possible to use third-party data to build a fuzzy model of a group. Typically, such a model comes in a form of a set of fuzzy rules, which can be used to determine membership grades of respondents in the group with a level of certainty sufficient to violate group anonymity. In the work, we introduce an evolutionary computing based method to build such a model. We also discuss a memetic approach to protecting the data from group anonymity violation in this case.
format Online
Article
Text
id pubmed-4728171
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-47281712016-02-03 Evolutionary approach to violating group anonymity using third-party data Tavrov, Dan Chertov, Oleg Springerplus Research In the era of Big Data, it is almost impossible to completely restrict access to primary non-aggregated statistical data. However, risk of violating privacy of individual respondents and groups of respondents by analyzing primary data has not been reduced. There is a need in developing subtler methods of data protection to come to grips with these challenges. In some cases, individual and group privacy can be easily violated, because the primary data contain attributes that uniquely identify individuals and groups thereof. Removing such attributes from the dataset is a crude solution and does not guarantee complete privacy. In the field of providing individual data anonymity, this problem has been widely recognized, and various methods have been proposed to solve it. In the current work, we demonstrate that it is possible to violate group anonymity as well, even if those attributes that uniquely identify the group are removed. As it turns out, it is possible to use third-party data to build a fuzzy model of a group. Typically, such a model comes in a form of a set of fuzzy rules, which can be used to determine membership grades of respondents in the group with a level of certainty sufficient to violate group anonymity. In the work, we introduce an evolutionary computing based method to build such a model. We also discuss a memetic approach to protecting the data from group anonymity violation in this case. Springer International Publishing 2016-01-26 /pmc/articles/PMC4728171/ /pubmed/26844025 http://dx.doi.org/10.1186/s40064-016-1692-9 Text en © Tavrov and Chertov. 2016 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Research
Tavrov, Dan
Chertov, Oleg
Evolutionary approach to violating group anonymity using third-party data
title Evolutionary approach to violating group anonymity using third-party data
title_full Evolutionary approach to violating group anonymity using third-party data
title_fullStr Evolutionary approach to violating group anonymity using third-party data
title_full_unstemmed Evolutionary approach to violating group anonymity using third-party data
title_short Evolutionary approach to violating group anonymity using third-party data
title_sort evolutionary approach to violating group anonymity using third-party data
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4728171/
https://www.ncbi.nlm.nih.gov/pubmed/26844025
http://dx.doi.org/10.1186/s40064-016-1692-9
work_keys_str_mv AT tavrovdan evolutionaryapproachtoviolatinggroupanonymityusingthirdpartydata
AT chertovoleg evolutionaryapproachtoviolatinggroupanonymityusingthirdpartydata